G06F11/3495

Risk management system interface

A method may include generating a user interface (UI) to facilitate interaction with a risk management system. The UI may include a first element indicating a rule used by the risk management system to manage risk for a client, a second element indicating effectiveness of the rule, and a third element invocable to modify the rule. The method may also include monitoring activity of the client to determine whether the activity of the client shifts the client into a different category of client; determining that the client is shifted into the different category; based on the shift, modifying the second element to include a recommended modification to the rule; and in response to receiving an interaction with the second element, applying the recommended modification to the rule.

Quantum-based security for hardware devices

In aspects of quantum-based security for hardware devices, a computing device includes a processor for application processing in a trusted execution environment, and includes a quantum random number generator to generate quantum random numbers sourced by multiple hardware devices in the computing device. The computing device also includes an embedded secure element that manages connection security of the multiple hardware devices, and is a single root of trust as a secure controller of the quantum random number generator. The computing device also includes a secure switch controlled by the embedded secure element, the secure switch being switchable to connect at least one of the multiple hardware devices to obtain a quantum random number from the quantum random number generator. The secure switch may be a virtualized secure switch implemented in the embedded secure element.

Microservices application network control plane
11595272 · 2023-02-28 · ·

Disclosed embodiments are directed at systems, methods, and architecture for operating a control plan of a microservices application. The control plane corresponds with data plane proxies associated with each of a plurality of APIs that make up the microservices application. The communication between the data plane proxies and the control plane enables automatic detection of service groups of APIs and automatic repair of application performance in real-time in response to degrading service node conditions.

Increasing power efficiency for an information handling system
11592894 · 2023-02-28 · ·

In one embodiment, a method for increasing power efficiency for an information handling system includes: monitoring, by a host service, one or more performance metrics associated with a memory device of the information handling system, the memory device including a power controller communicably coupled to a management device via a side-band bus; predicting, by the host service, an energy requirement for the memory device based on the one or more performance metrics; generating, by the host service, a power configuration profile based on the energy requirement, the power configuration profile indicating one or more power controller parameters associated with the power controller; sending, by the host service, the power configuration profile to the management device; receiving, by the management device, the power configuration profile; and modifying, by the management device and via the side-band bus, the one or more power controller parameters based on the power configuration profile.

Method and system for generating latency aware workloads using resource devices in a resource device pool

A method for managing data includes obtaining, by a management module, a workload generation request, wherein the workload generation request specifies a plurality of resource devices, identifying available resource devices in a resource device pool based on the plurality of resource devices, performing a latency analysis on the available resource devices to obtain a plurality of resource device combinations and a total latency cost of each resource device combination, and selecting a resource device combination of the plurality of resource device combinations based on the total latency cost of each resource device combination, wherein the resource device combination comprises a second plurality of resource devices and wherein each of the second plurality of resource devices is one of the plurality of resource devices.

MANAGING CONTAINERS ON A DATA STORAGE SYSTEM

Mechanisms and techniques are employed for managing the allocation and load balancing of storage system resources for the containerized, distributed execution of applications on a storage system. A control component executing on a processing component of the storage system may control reserving the necessary resources on one or more processing components to implement an application, and control a container management module to create, deploy and/or modify one or more containers on one or more processing components of the storage system. The one or more containers then may be executed to implement the application. Multiple processing components of the storage system may have a resource management module executing thereon. The control component may exchange communications with the one or more resource management modules of each processing component to determine the resources available within the processing component; e.g., to determine whether the processing component can satisfy the resource requirements of the application.

HIGH VOLUME DATA LOGGING FROM HARDWARE

A hardware system for simulating a network physical layer for communication channels. The hardware system includes a plurality of hardware processors configurable to model a network physical layer and communication channels. The hardware system further includes a multi-point data switch configured to be coupled to various data log points associated with the plurality of hardware processors. The hardware system further includes a RAM coupled to the multi-point data switch, where the RAM is configured to store log data provided by the multi-point data switch as software defined data structures

Measuring performance of virtual desktop event redirection

The disclosure provides an approach for measuring performance between a virtualized desktop infrastructure (VDI) client running on a client device and a remote computing device. Embodiments include generating, by a performance client on the client device, an event and storing a time associated with generating the event. Embodiments include transmitting, by the VDI client to the remote computing device, a message based on the OS event. Embodiments include determining, by a performance agent on the remote computing device, a time associated with receiving the message at the remote computing device and causing an indication of the time to be displayed in a virtual desktop screen. Embodiments include extracting, by the performance client, from the virtual desktop screen, the time, and determining a performance metric based on the extracted time and the time associated with receiving the message at the remote computing device.

Method and system for automatic real-time causality analysis of end user impacting system anomalies using causality rules and topological understanding of the system to effectively filter relevant monitoring data
11500757 · 2022-11-15 · ·

A system and method is disclosed for the automated identification of causal relationships between a selected set of trigger events and observed abnormal conditions in a monitored computer system. On the detection of a trigger event, a focused, recursive search for recorded abnormalities in reported measurement data, topological changes or transaction load is started to identify operating conditions that explain the trigger event. The system also receives topology data from deployed agents which is used to create and maintain a topological model of the monitored system. The topological model is used to restrict the search for causal explanations of the trigger event to elements of that have a connection or interact with the element on which the trigger event occurred. This assures that only monitoring data of elements is considered that are potentially involved in the causal chain of events that led to the trigger event.

Method and system for generating alerts using parameter based network monitoring for alert conditions

Provided are systems and methods for generating alerts in a computing environment. An example method may commence with receiving parameters associated with an alert. The parameters may include at least an alert condition and an action to be performed based on the alert condition. The method may further include monitoring at least a portion of a network data according to a predetermined schedule based on the parameters. The method may further include generating the alert upon detection of the alert condition.